The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing tra...
Building Automation and Control Systems (BACS) are traditionally based on specialized communications protocols, such as KNX or BACnet, and dedicated sensing and actuating devices. Despite the increased awareness about the security risks associated with BACS, there is a lack of security tools for protecting this special breed of cyber-physical systems. This is further aggravated by the fact that general-purpose ...
Background Purposeful participation in personally meaningful life tasks, enjoyment of positive reciprocal relationships, and opportunities to realize one’s potential are growth-related aspects of a meaningful life that should be considered important dimensions of recovery from homelessness. The extent to which homeless services support individuals to achieve the capabilities they need to become who they want to...
Contemporary societies are increasingly dependent on products and services provided by Critical Infrastructure (CI) such as power plants, energy distribution networks, transportation systems and manufacturing facilities. Due to their nature, size and complexity, such CIs are often supported by Industrial Automation and Control Systems (IACS), which are in charge of managing assets and controlling everyday opera...
Background Purposeful participation in personally meaningful life tasks, enjoyment of positive reciprocal relationships, and opportunities to realize one’s potential are growth-related aspects of a meaningful life that should be considered important dimensions of recovery from homelessness. The extent to which homeless services support individuals to achieve the capabilities they need to become who they want to...
Due to the growing complexity and scale of IT systems, there is an increasing need to automate and streamline routine maintenance and security management procedures, to reduce costs and improve productivity. In the case of security incidents, the implementation and application of response actions require significant efforts from operators and developers in translating policies to code. Even if Machine Learning ...
Atividades antropogénicas e eventos extremos como incêndios florestais afetam os ecossistemas, criando regimes de estresse e distúrbios ecológicos. O estudo foi realizado em Portugal (zona central oeste) e avalia o impacto de um evento extremo como um incêndio na vida selvagem, através das diferenças no número de animais atropelados. O trabalho de campo foi realizado durante 24 meses, um ano antes e um após o i...
The past years have witnessed an increasing interest and concern regarding the development of security monitoring and management mechanisms for Critical Infrastructures, due to their vital role in ensuring the availability of many essential services. This task is not easy due to the speci c characteristics of such systems, and the natural resistance of Critical Infrastructures operators against actions implying...
Prior experience from the authors has shown that a heavily theoretical approach for cybersecurity training has multiple shortcomings, mostly due to the demanding and diversified nature of the prerequisites, often involving concepts about operating system design, networking and computer architecture, among others. In such circumstances, the quest for trainee engagement often turns into a delicate balancing act b...
The next-generation of Industrial Automation and Control Systems (IACS) and Supervisory Control and Data Acquisition (SCADA) systems pose numerous challenges in terms of cybersecurity monitoring. We have been witnessing the convergence of OT/IT networks, combined with massively distributed metering and control scenarios such as smart grids. Larger and geographically widespread attack surfaces, and inherently mo...